Opswat Flashcards

(198 cards)

1
Q

What is CDR?

A

CDR is Content Disarm & Reconstruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is CIP?

A

CIP is Critical Infrastructure Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is NAC?

A

NAC is Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Opswat’s DLP?

A

Opswat’s DLP is Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Opswat’s Zero Trust Philosophy?

A

Opswat’s Zero Trust Philosophy is Trust No File, Trust No Device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an ACL?

A

An ACL is an Access Control List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does an ACL do?

A

An ACL regulates IP & Port Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What port does MetaDefender Core use?

A

MetaDefender Core uses port 8008

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where can you download MetaDefender Core?

A

You can download MetaDefender Core at portal.opswat.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where can you look at Opswat Product Guides?

A

You can look at Opswat Product Guides at onlinehelp.opswat.com

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is MetaDefender Drive?

A

MetaDefender Drive is a Stand Alone Scanner with its own OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ICAP stand for?

A

ICAP stands for Internet Content Adaptation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CVE stand for?

A

CVE stands for Common Vulnerability & Exposures library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does LDAP stand for?

A

LDAP stands for Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Remediation?

A

Remediation is addressing a breach and limiting the amount of damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is OKTA?

A

OKTA is an identity provider or IdP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does SAML stand for?

A

SAML stands for Security Assertion Markup Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does VDI stand for?

A

VDI stands for Virtual Desktop Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does TLS stand for?

A

TLS stands for Transport Layer Security protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is an SDK?

A

An SDK is a Software Development Kit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is MetaDefender?

A

MetaDefender is a cybersecurity platform for preventing and detecting cybersecurity threats on multiple data channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Recursion with Opswat?

A

Recursion refers to how deep (how many layers) inside an archive MetaDefender will scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the 6 Trust No File Technologies of MetaDefender Core?

A

The 6 Trust No File Technologies of MetaDefender Core are:

1) Proactive DLP
2) Deep CDR
3) Sandbox
4) File-Based Vulnerability Assessment
5) Threat Intelligence
6) Multiscanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are the 2 primary components of MetaDefender Core?

A

The 2 primary components of MetaDefender Core are:

1) MetaDefender Service
2) MetaDefender Node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does API stand for?
API stands for an Application Program Interface
26
What is MetaAccess
MetaAccess is used to manage devices (managed devices, BYOD devices, Guest) and control access to an organization's cloud-based applications such as Dropbox, O365, and Box.
27
Describe MetaDefender Core Version 4
Can be installed in an online/offline environment or on the cloud (MD Cloud). It always comes with a local node.
28
What does MD Kiosk do?
MD Kiosk is used to scan files coming from portable media such as USB, CD/DVD, and phones.
29
What is MD Vault?
MD Vault allows customers to upload/download files after processed by Core to/from storage servers.
30
What is MD Email Gateway Security used for?
MD Gateway Security is used to scan emails in/out of an organization.
31
What is MD ICAP (Internet Content Adaptation Protocol) used for?
MD ICAP is used to scan HTTP traffic (upload/download files)
32
What is MD Drive
OPSWAT USB included MD Core and has a light Linux-based OS. It can be used to boot into a system and scan files.
33
What is MD Central Management v7?
Used to managed MetaDefender products centrally CM v5 + manage devices (MA features)
34
What does MetaDefender for Secure Image do?
Offers the ability to protect Data Storage such as Box, OneDrive
35
Dan Shields
Network Engineer
36
Confluence
Knowledge Base Policy & Procedure Documentation
37
JIRA
Service Desk Ticketing Software
38
What is CSF?
Cyber Security Framework
39
What are the core components of CSF (Cyber Security Framework)?
1) Core 2) Tiers 3) Profiles 4) Implementation Guidence
40
What are the CSF (Cyber Security Framework) core functions?
1) Identify 2) Protect 3) Detect 4) Respond 5) Recover
41
What does Linux command SU do?
SU Changes the user
42
What is the Linux command SUDO for?
SUDO is Super User Do!
43
What does the Linux command If Config do?
If Config provides system information
44
What does the Linux command Sudo Init 0 do?
Sudo Init 0 will shutdown the machine
45
What does the Linux command Sudo Shutdown -r do?
Sudo Shutdown -r will restart the machine
46
Dan Lanir
Senior VP of Customer Success
47
John DiNapoli
Director of Customer Success (San Francisco)
48
Kat Lewis
Director of Corporate Communications
49
Jason Richard
Executive Creative Director (Branding)
50
Kimberly Howell
Executive Assistant for Benny
51
Stephanie Breslin
Director of HR (San Francisco)
52
What does GDPR stand for?
General Data Protection Regulation
53
Arun Sangameswaran
Customer Success Senior Engineer
54
What Opswat service does Charles Schwab utilize?
Metadefender Cloud
55
What is are the main two questions/points of Kirk's KPI discussion?
Ask customers: 1) What value are we providing? 2) What is the reason?
56
What are CVE's?
Common Vulnerability & Exposures
57
What does GDRP stand for?
Global Data Retention Policy
58
Where is the IT FAQ located?
The IT FAQ is located in Confluence. Always check it first.
59
How do you launch JIRA & Confluence?
By going through OKTA
60
What type of ticketing system is JIRA?
JIRA is both an internal and external ticketing system
61
What are the versions of MetaDefender Drive?
1) Community 2) Pro 3) Enterprise 4) Advanced
62
What are some of the steps to building an MD Drive?
Use the Portal in OKTA Go to Products Go to MD Utilities Go to MD Drive Creator Download, Unzip & Launch Creator Install License Key
63
What does COO mean?
COO stands for Country Of Origin
64
What type of USB does MD Drive use?
Kangaroo
65
What key do you have to tap to boot from the USB MD Drive?
F12
66
Mike Barker
Chief Revenue Officer
67
Steve Gorham
CIO and Head of Global Operations
68
Pamela Bartz
Senior VP of Marketing (Tampa)
69
What type of environment is a Sandbox?
Dynamic
70
What type of solution is SNDBOX?
SNDBOX is an on premises sandbox solution and accelerated development of CIP (Critical Infrastructure Protection)
71
What is a MAS?
Malware Analysis Solution
72
What is OT?
Operational Technology
73
What is a PK?
A PK is a Policy Key
74
What is Design Thinking?
Driving Growth and Innovation Through the Customer
75
What is the L1001?
A Kiosk
76
What are the Criticality Levels of JIRA?
Blocker Critical Major Minor Low/Trivial
77
What is a PUA?
Potentially Unwanted Application
78
What is a COG or COGS?
Cost Of Goods Sold
79
What is Hunting?
Going after new clients
80
What is Farming?
Going after renewals for existing clients
81
What is NAC?
Network Access Control
82
What is an SE?
Sales Engineer
83
Amit Schulman
The Lead Sales Engineer
84
Matt Boksa
Sales Engineer Team Lead
85
What was a SAM? (This term is not used anymore)
Sales Account Manager
86
What personality characteristic did Stephen mention that Tech Support people have?
Technical Intelligence
87
What personality characteristic did Stephen mention that Customer Success people have?
Personality
88
What teams does Customer Success communicate with?
Tech Support Dev Customer
89
What is Customer Success like?
The Glue!
90
What is Account Success for the Customer?
Account Success is the Customer Advocate
91
What are the Levels of Opswat Support? (SLA's)
1) Standard 2) Gold 3) Platinum 4) Rhodium
92
What does CTRL+J do in the Edge Browser?
Shows Downloads
93
Kira Parisi
QA Engineer
94
Where is the Prep Playbook?
Confluence
95
Where is Account Opportunities?
Salesforce
96
What is a PoC?
Proof of Concept - A test before an actual project
97
What is an SLA?
Service Level Agreement
98
What are Salesforce Proserve Cases?
Cases Assigned to you
99
What are some of the build specifications for a Windows VM?
4096 MB Startup Memory 100 GB Virtual HD Generation 2 Uncheck Dynamic Memory
100
Where do you download MD Core?
In the Portal under Products
101
What utility is used to create a bootable USB?
RUFUS
102
What are two things to remember when creating the USB for NetWall imaging?
1) Do not change the name of the volume 2) Always write in DD image mode
103
What does WinSCP stand for?
Windows Secure Copy (FTP software)
104
Ricardo Guzman
Associate Customer Success Engineer
105
Mark Creasy
Customer Success Engineer
106
Derrick Reeves
Customer Success Engineer
107
Mike Greene
Associate Technical Support Engineer
108
What does LDAP stand for?
Lightweight Directory Access Protocol
109
What order are the two main Revenue drivers for Opswat?
1) MD Core 2) Kiosk
110
Thomas Sedgwick
Technology Logistics Administrator for Customer Success
111
Ardee Aquino
Technical Support Engineer
112
Edwuardo Villa
Customer Support Engineer (Customer Success)
113
How do you turn on Hyper V?
Control Panel -> Programs and Features
114
What are some of the specifications for a Linux VM?
2048 MB memory 100 GB Virtual HD Generation 1 Uncheck Dynamic Memory
115
Where are Activation Keys for MD Core stored on the activation server?
Inventory
116
When troubleshooting what order would you use Opswat's resources?
1) Confluence 2) Salesforce 3) JIRA
117
In the OZ principal how does Accountability begin?
Accountability begins by Clearly Defining the RESULTS
118
What are the ways a customer can utilize Salesforce?
1) Email 2) Portal 3) Chat 4) Calling In
119
How should you sort in Salesforce?
Date/Time Opened
120
In the OZ Principle, what are the 4 Steps to Accountability?
1) See It - Acknowledge the Problem 2) Own It - Take Responsibility for It 3) Solve It - Determine What I Can Do 4) Do It - Take Action
121
What is Above The Line in the OZ Principle?
Above the Line – Steps to Accountability See It Own It Solve It Do It
122
What is Below The Line in the OZ Principle?
Below the Line – The Blame Game Wait and See Confusion / Tell Me What to Do It is Not My Job Ignore / Deny Finger Pointing Cover Your Tail
123
What is the OZ Principles definition of Accountability?
Accountability is a personal choice to rise above one's circumstances and demonstrate the ownership necessary for achieving desired results to SEE IT, OWN IT, SOLVE IT, and DO IT. SOSD
124
Who wrote the OZ Principle?
Roger Connors
125
What is Postgres?
PostgreSQL is an open source relational database management system.
126
What does SQL stand for?
Structured Query Language
127
What does MetaAccess do?
MetaAccess confirms devices comply with security policies before accessing any cloud applications or local resources while delivering cross-enterprise visibility on a single pane of glass.
128
What Is a Security Operations Center (SOC)?
Security operations staffing and organizational structure. The function of a security operations team and, frequently, of a security operations center (SOC), is to monitor, detect, investigate, and respond to cyberthreats.
129
What is a SOC?
Security Operations Center
130
What are the four (4) departments of Customer Success?
1) Technical Support 2) Account Success (This is you!) 3) Supply Chain 4) Professional Services
131
Edwardo Villa
CS Support Engineer
132
John DiNapoli
Director of Customer Success
133
What does SOW stand for?
Statement Of Work
134
What does SDP stand for?
Software Defined Perimeter
135
What does QBR stand for?
Quarterly Business Review
136
What is the Trace Route command?
tracert
137
What is an SDP?
Software Defined Perimeter
138
What is DMZ?
Demilitarized Zone A DMZ separates a LAN from untrusted networks, usually the public Internet.
139
Ardee Aquino
Technical Customer Support Engineer
140
Dan Lanir
VP of Customer Success
141
John DiNapoli
Director of Customer Success
142
What is an NPS?
Net Promoter Score
143
What does a Net Promoter Score (NPS) do?
Measures Customer Loyalty
144
What are the three customer categories that are used to calculate the NPS?
1) Detractors 2) Passives 3) Promoters
145
What are the three customer categories that are used to calculate the NPS?
1) Detractors: Score of 0-6 (Unlikely to recommend a company or product to others, probably won’t stick around or repeat purchases, and—worse—could actively discourage potential customers away from a business.) 2) Passives: Score of 7-8 (Not actively recommending a brand, but are also unlikely to damage it with negative word of mouth. Although they are not included in the NPS calculation, passives are very close to being promoters (particularly when they give a score of 8), so it always makes strategic sense to spend time investigating what to do to win them over.) 3) Promoters: Score of 9 and 10 (Most enthusiastic and loyal customers: these people are likely to act as brand ambassadors, enhance a brand’s reputation, and increase referral flows, helping fuel the company's growth.)
146
What does OT do?
Controls Equipment
147
What does IT do?
Controls Data
148
What is SCADA?
SCADA is a type of OT and stands for: Supervisory Control And Data Acquisition systems
149
How is NPS calculated?
NPS is calculated by subtracting the percentage of customers who answer the NPS question with a 6 or lower (known as ‘detractors’) from the percentage of customers who answer with a 9 or 10 (known as ‘promoters’).
150
What is UAT?
User Acceptance Testing
151
What is a Hypervisor?
A hypervisor (or virtual machine monitor, VMM, virtualizer) is a kind of emulator; it is computer software, firmware or hardware that creates and runs virtual machines.
152
AFAIK
As Far As I Know
153
FYSA
For Your Situational Awareness
154
OTOH
On The Other Hand
155
Value Prop (Proposition)
(in marketing) an innovation, service, or feature intended to make a company or product attractive to customers.
156
IPO
An initial public offering (IPO) refers to the process of offering shares of a private corporation to the public in a new stock issuance. An IPO allows a company to raise capital from public investors.
157
Mike Barker
Chief Revenue Officer (Tampa)
158
OOO
Out Of Office
159
Remediate
Provide a remedy for; redress or make right
160
Steven Goforth
VP of IT & Security Operations
161
What does CIP do?
Critical Infrastructure Protection is the practice of making sure critical networks remain protected
162
What does OTP stand for?
On The Phone
163
What is Dynamic Analysis?
Analyzing Malware in a Safe Environment such as a Sandbox
164
What is FTW? (Acronym)
For The Win!
165
What is ICS?
Industrial Control Systems
166
PLC
Programmable Logic Controller
167
IIOT
Industrial Internet Of Things
168
HMI
Human Machine Interface
169
TCA
Transient Cyber Assets
170
RM
Removable Media
171
The Internet of things (IoT)
Describes physical objects (or groups of such objects) that are embedded with sensors, processing ability, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or other communications networks.
172
SWAG
Silly Wild Ass Guess
173
TCA
Transient Cyber Asset
174
ICS
Industrial Control Systems
175
Andrew Segraves
Director, Renewals & Inside Sales
176
WIP
Work In Progress
177
RADIUS
Remote Authentication Dial-In User Service
178
Stephen Gorham
CIO & Head of Global Operations
179
ICS
Industrial Control Systems
180
Razvan Chilu
Senior Director of Professional Services and Support
181
CSNA AS
Customer Success North America Account Success (Distribution Group)
182
CSNA CS
Customer Success North America Customer Support (Distribution Group)
183
CSNA PS
Customer Success North America Professional Services (Distribution Group)
184
RADIUS
Remote Authentication Dial-In User Service A networking protocol that provides AAA - Authentication, Authorization, and Accounting
185
SDP
Software Defined Perimeter
186
SCADA
Supervisory Control and Data Acquisition
187
What is Blob Storage?
Blob storage is a feature in Microsoft Azure that lets developers store unstructured data in Microsoft's cloud platform. This data can be accessed from anywhere in the world and can include audio, video and text. Blobs are grouped into "containers" that are tied to user accounts.
188
ORBC
Onboarding and Renewal Based Checkups (ORBC)
189
What are Deliverables?
The term "deliverables" is a project management term that's traditionally used to describe the quantifiable goods or services that must be provided upon the completion of a project. Deliverables can be tangible or intangible in nature.
190
What is OT?
Operational technology (OT) is hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes and events.[1] The term has become established to demonstrate the technological and functional differences between traditional IT systems and Industrial Control Systems environment, the so-called "IT in the non-carpeted areas". Examples of operational technology include: programmable logic controllers (PLCs) Supervisory control and data acquisition systems (SCADA) Distributed control systems (DCS) Computer Numerical Control (CNC) systems, including computerized machine tools Scientific equipment (e.g. digital oscilloscopes) Building Management and Building Automation Systems, (BMS)/(BAS) Lighting controls both for internal and external applications Energy monitoring, security and safety systems for the built environment Transportation systems for the built environment
191
Dichotomy
A division or contrast between two things that are or are represented as being opposed or entirely different. "a rigid dichotomy between science and mysticism" Synonyms: division · separation · divorce · split · gulf · chasm · difference · contrast · disjunction · polarity · lack of consistency · contradiction · antagonism · conflict · contrariety.
192
GDPR
General Data Protection Regulation (GDPR)
193
Kaizen
A Japanese term that means "change for the better ," has been adapted by organizations as a business strategy aimed at establishing an environment of continuous improvement. The goal of Kaizen is to make the organization, and its products, services and people, better by implementing small scale changes throughout the company.
194
What is a REST API?
REST is a stateless, cacheable client-server communication protocol and stands for Representational State Transfer (ReST). It is an architecture style for designing networked applications that uses simple HTTP requests...
195
What are Webhooks used for?
A Webhook is a lightweight API that powers one-way data sharing triggered by events. Together, they enable applications to share data and functionality, and turn the web into something greater than the sum of its parts. APIs and Webhooks both allow different software systems to sync up and share information.
196
What is Trello?
Trello is a collaboration tool that organizes your projects into boards. In one glance, Trello tells you what's being worked on, who's working on what, and where something is in a process.
197
SOC
Security Operations Center The function of the security operations center (SOC) is to monitor, prevent, detect, investigate, and respond to cyber threats around the clock. SOC teams are charged with monitoring and protecting the organization's assets including intellectual property, personnel data, business systems, and brand integrity. (A team of experts that proactively monitor an organization's ability to operate securely.)
198
LDAP
LDAP (Lightweight Directory Access Protocol) is a software protocol for enabling anyone to locate data about organizations, individuals and other resources such as files and devices in a network -- whether on the public Internet or on a corporate Intranet.